A recent report by Cyble has shed light on the evolving tactics of hacktivist groups, moving beyond traditional cyber disruptions like DDoS attacks and website defacements to engage in more advanced critical infrastructure attacks and ransomware operations.
Advanced Attack Strategies
Hacktivism is transforming into a complex tool of hybrid warfare, with groups adopting tactics traditionally associated with nation-state actors and financially motivated cybercriminals.
Groups like NoName057(16), Hacktivist Sandworm, Z-pentest, Sector 16, and Overflame are increasingly targeting NATO-aligned nations and Ukraine supporters, aiming to destabilize critical systems with sophisticated attack methods.

A notable shift has been the targeting of Industrial Control Systems (ICS) and Operational Technology (OT), with a 50% surge in attacks in March 2025.
This includes a focus on internet-facing infrastructures, now seen as prime targets for political and economic disruption.
Hacktivist groups are engaging in multi-vector attacks, combining DDoS, credential leaks, and ICS disruption to bypass single-layer defenses, showcasing the evolution Cyble had forewarned in its 2024 Annual Report.
The energy and utilities sector has become a focal point for these advanced attacks, affecting everything from energy distribution to water utilities, reflecting a strategic intent to disrupt services critical to national resilience.
Countries experiencing notable cyber hostilities include:
- Israel: A persistent target with an uptick in attacks in March, driven by pro-Palestinian hacktivists reacting to ongoing conflicts in Gaza.
- India: With the highest number of incidents in January, likely due to its growing strategic visibility and regional rivalries.
- U.S.: A noticeable increase in attacks in March, correlated with new administration policies including strikes in Yemen and import tariffs.
- NATO Countries: France, Italy, and Spain faced sustained attacks, with Spain seeing a sharp rise in March as part of reprisals against NATO members for support of Ukraine.
Ransomware and Data Exfiltration
Several hacktivist groups have integrated ransomware into their operations, blurring the lines between politically motivated attacks and cybercrime:
- BO Team: Targeted a Russian industrial manufacturer linked to the Ministry of Defense, encrypting over 1,000 hosts and 300TB of data, culminating in a $50,000 Bitcoin ransom payment.
- Yellow Drift: Compromised over 250TB of government data from the Tomsk region in Russia and 550TB from the national e-procurement system.
- C.A.S.: Carried out a coordinated cyber operation against a Russian tech firm, exfiltrating approximately 3 terabytes of internal corporate data and partially destroying the company’s infrastructure.
- Moroccan Dragons: Announced the development of their ransomware program, M-DragonsWare, though specifics remain undisclosed.
Additionally, Cyble has observed increased sophistication in website attacks, with hacktivist groups like ParanoidHax, THE ANON 69, Indohaxsec, and Defacer Kampung engaging in SQL Injection, brute forcing web panels, exploiting OWASP vulnerabilities, and Dorking to discover misconfigurations.
This evolving landscape necessitates a proactive approach to cybersecurity:
- Network Segmentation: To limit the spread of attacks within infrastructure.
- Zero Trust Frameworks: Ensuring verification and securing communications at every level.
- Ransomware-Resistant Backups: Protecting critical data to mitigate the impact of ransomware attacks.
- Monitoring of Network, Endpoint, and Cloud Assets: To detect and respond swiftly to emerging threats.
Cyble’s attack surface management solutions can be instrumental in scanning for exposures, prioritizing fixes, and monitoring for leaked credentials, providing early warning signs of major cyberattacks.
As hacktivism continues to evolve, organizations must adapt their cybersecurity strategies to guard against these increasing risks effectively.
Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!